2.8
中危

03233e7c55091b7eb056290b44ac11f4d1dc9b4c1150a01f76630d59fc64c22d

03233e7c55091b7eb056290b44ac11f4d1dc9b4c1150a01f76630d59fc64c22d.exe

分析耗时

72s

最近分析

392天前

文件大小

44.1KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER UPATRE
鹰眼引擎
DACN 0.14
FACILE 1.00
IMCLNet 0.68
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Agent-AULS [Trj] 20191007 18.4.3895.0
Baidu Win32.Trojan-Downloader.Waski.a 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20191007 2013.8.14.323
McAfee Upatre-FAEL!A4072169C56E 20191007 6.0.6.653
Tencent None 20191007 1.0.0.1
静态指标
查询计算机名称 (2 个事件)
Time & API Arguments Status Return Repeated
1727545287.547375
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545287.906
GetComputerNameW
computer_name: TU-PC
success 1 0
检查进程是否被调试器调试 (2 个事件)
Time & API Arguments Status Return Repeated
1727545287.453375
IsDebuggerPresent
failed 0 0
1727545287.844
IsDebuggerPresent
failed 0 0
可执行文件包含未知的 PE 段名称,可能指示打包器(可能是误报) (1 个事件)
section .ap0x
行为判定
动态指标
分配可读-可写-可执行内存(通常用于自解压) (2 个事件)
Time & API Arguments Status Return Repeated
1727545287.531375
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00401000
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1064
success 0 0
1727545287.891
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x00401000
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 920
success 0 0
在 PE 资源中识别到外语 (10 个事件)
name RT_ICON language LANG_ZULU filetype None sublanguage SUBLANG_ARABIC_LIBYA offset 0x0000a17c size 0x00001ca8
name RT_ICON language LANG_ZULU filetype None sublanguage SUBLANG_ARABIC_LIBYA offset 0x0000a17c size 0x00001ca8
name RT_RCDATA language LANG_ZULU filetype None sublanguage SUBLANG_ARABIC_LIBYA offset 0x000053e0 size 0x00000a46
name RT_RCDATA language LANG_ZULU filetype None sublanguage SUBLANG_ARABIC_LIBYA offset 0x000053e0 size 0x00000a46
name RT_GROUP_ICON language LANG_ZULU filetype None sublanguage SUBLANG_ARABIC_LIBYA offset 0x0000be28 size 0x00000014
name RT_GROUP_ICON language LANG_ZULU filetype None sublanguage SUBLANG_ARABIC_LIBYA offset 0x0000be28 size 0x00000014
name RT_VERSION language LANG_ZULU filetype None sublanguage SUBLANG_ARABIC_LIBYA offset 0x0000be40 size 0x0000025c
name RT_VERSION language LANG_ZULU filetype None sublanguage SUBLANG_ARABIC_LIBYA offset 0x0000be40 size 0x0000025c
name RT_MANIFEST language LANG_ZULU filetype None sublanguage SUBLANG_ARABIC_LIBYA offset 0x0000c0a0 size 0x00000152
name RT_MANIFEST language LANG_ZULU filetype None sublanguage SUBLANG_ARABIC_LIBYA offset 0x0000c0a0 size 0x00000152
在文件系统上创建可执行文件 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\kyyjs.exe
投放一个二进制文件并执行它 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\kyyjs.exe
将可执行文件投放到用户的 AppData 文件夹 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\kyyjs.exe
一个进程创建了一个隐藏窗口 (1 个事件)
Time & API Arguments Status Return Repeated
1727545287.672375
ShellExecuteExW
filepath: C:\Users\Administrator\AppData\Local\Temp\kyyjs.exe
filepath_r: C:\Users\ADMINI~1\AppData\Local\Temp\kyyjs.exe
parameters:
show_type: 0
success 1 0
该二进制文件可能包含加密或压缩数据,表明使用了打包工具 (1 个事件)
section {'name': 'UPX1', 'virtual_address': '0x00008000', 'virtual_size': '0x00002000', 'size_of_data': '0x00001a00', 'entropy': 7.393706635428362} entropy 7.393706635428362 description 发现高熵的节
可执行文件使用UPX压缩 (2 个事件)
section UPX0 description 节名称指示UPX
section UPX1 description 节名称指示UPX
网络通信
与未执行 DNS 查询的主机进行通信 (2 个事件)
host 74.125.34.46
host 114.114.114.114
文件已被 VirusTotal 上 53 个反病毒引擎识别为恶意 (50 out of 53 个事件)
ALYac Gen:Trojan.Ipatre.1
APEX Malicious
AVG Win32:Agent-AULS [Trj]
Acronis suspicious
Ad-Aware Gen:Trojan.Ipatre.1
AhnLab-V3 Downloader/Win32.Upatre.R291682
Antiy-AVL Trojan[Downloader]/Win32.Upatre
Arcabit Trojan.Ipatre.1
Avast Win32:Agent-AULS [Trj]
Avira TR/Crypt.XPACK.Gen
Baidu Win32.Trojan-Downloader.Waski.a
BitDefender Gen:Trojan.Ipatre.1
CAT-QuickHeal Trojan.UpatreRI.S7646295
ClamAV Win.Downloader.Upatre-6840800-0
Comodo TrojWare.Win32.TrojanDownloader.Upatre.AAL@5iclp5
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.9c56ee
Cylance Unsafe
DrWeb Trojan.DownLoad3.34292
ESET-NOD32 Win32/TrojanDownloader.Waski.A
Emsisoft Gen:Trojan.Ipatre.1 (B)
Endgame malicious (moderate confidence)
F-Secure Trojan.TR/Crypt.XPACK.Gen
FireEye Generic.mg.a4072169c56ee123
Fortinet W32/Waski.A!tr
GData Gen:Trojan.Ipatre.1
Ikarus Trojan.Win32.Bublik
Invincea heuristic
Jiangmin TrojanDownloader.Upatre.p
K7AntiVirus Trojan ( 004bcce41 )
K7GW Trojan ( 004bcce41 )
Kaspersky Trojan-Downloader.Win32.Upatre.bla
MAX malware (ai score=83)
Malwarebytes Adware.IStartSurf
McAfee Upatre-FAEL!A4072169C56E
McAfee-GW-Edition BehavesLike.Win32.MultiDropper.pm
MicroWorld-eScan Gen:Trojan.Ipatre.1
Microsoft TrojanDownloader:Win32/Upatre.AA
NANO-Antivirus Trojan.Win32.Upatre.dfecyf
Panda Trj/Upatre.N
Qihoo-360 HEUR/QVM19.1.642F.Malware.Gen
Rising Dropper.Dapato!8.2A2 (TFE:2:1rA9VijPqKK)
SentinelOne DFI - Malicious PE
Sophos Troj/HkMain-AZ
Symantec ML.Attribute.HighConfidence
Trapmine malicious.high.ml.score
TrendMicro TROJ_UPATRE.SM37
TrendMicro-HouseCall TROJ_UPATRE.SM37
VBA32 TrojanDownloader.Upatre
VIPRE Trojan-Downloader.Win32.Cutwail.bza (v)
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1973-03-03 18:25:35

PE Imphash

282845caafb77fe66ad750ccd3132121

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
UPX0 0x00001000 0x00007000 0x00005000 3.6955461579921596
UPX1 0x00008000 0x00002000 0x00001a00 7.393706635428362
.rsrc 0x0000a000 0x00003000 0x00002400 3.965931796080329
.ap0x 0x0000d000 0x00000394 0x00000400 3.5466404850820186

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0000a17c 0x00001ca8 LANG_ZULU SUBLANG_ARABIC_LIBYA None
RT_RCDATA 0x000053e0 0x00000a46 LANG_ZULU SUBLANG_ARABIC_LIBYA None
RT_GROUP_ICON 0x0000be28 0x00000014 LANG_ZULU SUBLANG_ARABIC_LIBYA None
RT_VERSION 0x0000be40 0x0000025c LANG_ZULU SUBLANG_ARABIC_LIBYA None
RT_MANIFEST 0x0000c0a0 0x00000152 LANG_ZULU SUBLANG_ARABIC_LIBYA None

Imports

Library kernel32.dll:
0x403000 LoadLibraryA
0x40300c InterlockedExchange
0x403020 GetStartupInfoA
0x403024 GetModuleHandleA
Library MSVCRT.dll:
0x40302c _except_handler3
0x403030 _controlfp
0x403034 __set_app_type
0x403038 __p__fmode
0x40303c __p__commode
0x403040 _adjust_fdiv
0x403044 __setusermatherr
0x403048 _exit
0x40304c _initterm
0x403050 __getmainargs
0x403054 _acmdln
0x403058 exit
0x40305c _XcptFilter
Library USER32.dll:
0x403064 PostQuitMessage
0x403068 SendMessageA
0x40306c DestroyWindow
0x403070 DefWindowProcA
0x403074 CreateWindowExA
0x403078 UpdateWindow
0x40307c RegisterClassExA
0x403080 FindWindowA
0x403084 ShowWindow
0x403088 GetMessageA
0x40308c TranslateMessage
0x403090 DispatchMessageA
0x403094 IsIconic

L!This program cannot be run in DOS mode.
s@m_B5
@=6"@
YG+}p{
hSVWeo
$Tn0ou>"u:F
XPVSS#$Pi
bh=[NX
TEXMs_
xs,OSy
%lrrA;
b.'M;c
.gV'ohy
;7KMrmsf
"-IlVY
i6w/cGV
;fBwbfz
kaF0(kU3)=BE
o @(@vM_
^v\0z<
[@*|;"^B
pUf>y6
0r'&`^{=
uM>mDGQ
n[7F-s6<~wm]Dme
m"d%Ws
Lfx5*R
+[1e*+<48n
Z\!4$Qq$&
Zr}-Xk
m]EW|X$U
m\`\#y8_EUn
@gA3lC.a82
<kC#7dWMp}
<J{gVyF\\'j
|,!!*U_'!iQ
OUDvR{
7a-6hp
<~m:/o
oK[ztf
}6N_l}Y14_V
e#Y&UY
f8\B$!
#Ko0j!olQO
Cgx(PgKfT"p,`m:D
^rX%_B_%7zi#
^[%]*bF
}3h5Lj
za1X[[U]rjy
7xcLUZ1h
hSVWe3
EEP5dG@
EPEPEP
0u>"u:Fu
<"u>"u
> vFuj
bh=[NX
TEXMs_
xs,OSy
}z%lrrA;
b.'M;c
;7KMrmsf
"-IlVY
i6wcGVZ;fBwbfz
0(kU3)=BE
o @(@vM
OQdlr=aPt
\JrY}q
[@*|;"^B
pUf>t6
0r'&`^{=
uM>mDGQ
m"d%Ws
Lfx5*R
+9[1e*+
Z\!4$Qq$&
Zr}-Xk
kF]EW|X$U
m\`\#28_EUn
@gA3lC.a82
<kC#dWMp
$<J{gVyF\\'j
,!hGAi
|,!!*m
OUDvR{
^B9k*#
]JNnxC1
oK[ztf
6N_l}Y14x_
"wm^9fW}QO
B!olQON
Cgx(PmfT"p,`m:sD
^rX%_B_%7zi#
^[%]*bF
}3h5Ls$'8
(oJaH?
dWza1X[U]rjF
}imx^BLUZvh
zum:4G{2"[:_
sli^;a%
WVSQ~UXE
}ht }it
@@@@@@@
^B#lcTD*#
FG3@_^]
@@@@@@@@
@@@@@@@
@@@@@@
fZuSAVWAf9
GGEGGEM;r
@@@@@@
Riched32.dll
RichEdit
\.Z~+:M
W{8'+ZVV@@
sanander
crashes
posaltoufive
secondmasteng
corect
Mivissini romi
A-z{r\@
Style [
name: styleMainWnd
bg_col: sepia
Style [
name: stylePage
padding: 32 16
bg_col: transparent
Style [
name: styleNextDefault
parent: buttonDefault
border_width: 0
padding: 0 8
stroke_width: 0
fill: gray
bg_col: transparent
vert_align: center
Style [
name: styleNextMouseOver
parent: styleNextDefault
fill: black
Style [
name: styleStatus
parent: buttonDefault
bg_col: light gray
col: black
font_size: 8
font_weight: regular
padding: 3 0
border_width: 0
text_align: center
Style [
name: styleProgress
bg_col: light gray
col: light blue
ButtonVector [
name: nextButton
clicked: next
path: M0 0 L10 13 L0 ,26 Z
style_default: styleNextDefault
style_mouse_over: styleNextMouseOver
ButtonVector [
name: prevButton
clicked: prev
path: M10 0 L0, 13 L10 26 z
style_default: styleNextDefault
style_mouse_over: styleNextMouseOver
Button [
name: statusButton
style: styleStatus
ScrollBar [
name: progressScrollBar
style: styleProgress
cursor: hand
EbookPage [
name: page
style: stylePage
HorizontalLayout [
name: top
children [
prevButton self 1 bottom
page 1 1 top
nextButton self 1 center
VerticalLayout [
name: mainLayout
children [
top 1 1 top
progressScrollBar self 1 center
statusButton self 1 center
]Style [
name: styleMainWnd
bg_col: sepia
Style [
name: stylePage
padding: 32 16
bg_col: transparent
Style [
name: styleNextDefault
parent: buttonDefault
border_width: 0
padding: 0 8
stroke_width: 0
fill: gray
bg_col: transparent
vert_align: center
Style [
name: styleNextMouseOver
parent: styleNextDefault
fill: black
Style [
name: styleStatus
parent: buttonDefault
bg_col: light gray
col: black
font_size: 8
font_weight: regular
padding: 3 0
border_width: 0
text_align: center
Style [
name: styleProgress
bg_col: light gray
col: light blue
ButtonVector [
name: nextButton
clicked: next
path: M0 0 L10 13 L0 ,26 Z
style_default: styleNextDefault
style_mouse_over: styleNextMouseOver
ButtonVector [
name: prevButton
clicked: prev
path: M10 0 L0, 13 L10 26 z
style_default: styleNextDefault
style_mouse_over: styleNextMouseOver
Button [
name: statusButton
style: styleStatus
ScrollBar [
name: progressScrollBar
style: styleProgress
cursor: hand
EbookPage [
name: page
style: stylePage
HorizontalLayout [
name: top
children [
prevButton self 1 bottom
page 1 1 top
nextButton self 1 center
VerticalLayout [
name: mainLayout
children [
top 1 1 top
progressScrollBar self 1 center
statusButton self 1 center
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetStartupInfoA
GetModuleHandleA
_except_handler3
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
PostQuitMessage
SendMessageA
DestroyWindow
DefWindowProcA
CreateWindowExA
UpdateWindow
RegisterClassExA
FindWindowA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
IsIconic
`.rdata
@.data
i6w/cGV
;fBwbfz
kaF0(kU3)=BE
o @(@vM_
^v\0z<
[@*|;"^B
pUf>y6
0r'&`^{=
uM>mDGQ
n[7F-s6<~wm]Dme
m"d%Ws
Lfx5*R
+[1e*+<48n
Z\!4$Qq$&
Zr}-Xk
m]EW|X$U
m\`\#y8_EUn
@gA3lC.a82
<kC#7dWMp}
<J{gVyF\\'j
|,!!*U_'!iQ
OUDvR{
7a-6hp
<~m:/o
oK[ztf
}6N_l}Y14_V
e#Y&UY
f8\B$!
#Ko0j!olQO
Cgx(PgKfT"p,`m:D
^rX%_B_%7zi#
^[%]*bF
}3h5Lj
za1X[[U]rjy
7xcLUZ1h
zu4G{2"[:_K
5_0<=mZ=
sli^8;a%
4P&f&5
<v-=jt
WTujV?2
XjijhkE
lKwht
i1d?m=+
%L%\p?
{/5WaOf
#lc*Pr`H/
?[5XB.
Y@Y;^@>`or^;6c$
?<Y!/-
_RK$~*Da
u9H/&[RT
gQS]h"
o>IfH<O6KFJJ#
f+ol4n
fZuSGA{Af9
IMAc]I
oH7/d9=YS[$
_>MIx/h
@M@ C|
@,4Ml1
;17d?v
TB,i0
??Riche@2.dll
Edita\.Z~+:M
W{8'+ZVV`nm/
2zr4h2
3K2L&&dd2LL&d2-"
sander
crashes
poltoufive}[~d/secom(teng
M(issini romi
-z{r\@[
Style [
name: s
MainWnd
bg_col
_padd6g
32 16;tra)ns
rentANextDefaul#+
button
xborv_width
stroke
aKfil}gyvYs
Mt_align
O4letblackL[a
U`[;f+sizN8
hmkwe+
xPUfess
EBVv57sLnr
51w7ed
M0 L1aVn
m_oOa
1L0, X
@w4029cje
<cursohRcDLE!;aoYL
-H;}vm
]lfA i
t bmoadLibraryA
Excuge
it'7izeCri[S1
Leav+]G@,rtupg>foA
ModuXHl[
_se/,pp_type
jusZo+fdiv7
\im#gsws
gs@cm(fso
XcFil+ndPobQuM
yWSdow
Regisel
*PuT5@WlHDG
sIVjPEl!L
H]U,/Wg
"'Ot_psrz.O$8
XPTPSWXaD$j
ie95he
GDGDFC
-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!-!
."3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&3&."
0$5'5'5'5'5'5'5'5'3&5'5'5'5'3&3&3&5'5'5'3&5'5'5'5'5'5'5'5'5'5'0$
2%6(6(6(6(6(6(6(6(6(6(6(6(vp6(6(6(6(6(6(6(6(6(6(6(6(2%
4&9*9*9*9*9*9*9*9*6(6(7(9*}v9*9*9*9*9*9*9*9*9*9*9*9*4&
5'>/>/>/>/>/>/>/>/>/>/
x>/>/7(7(<.>/>/>/>/>/>/>/5'
7)D3D3D3D3D3D3D3D3[MD3D3C3D3D3D3D3D3D3D3D3D37)
>/H9H9H9H9H9H9H9H9G8qgH9G8
{H9H9H9H9H9H9H9H9H9H9H9H9>/
D4L=L=L=L=L=L=L=L=qhL=qhL=L=D4D4J<L=L=L=L=L=L=L=D4
K<RCRCRCRCRCRCRCRCRCRCRCRCRCRCRCRCRCRCK<
RCWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHWHRC
YJ\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\L\LYJ
_P_P{p{p{p{p{p{pxmxmvkvkvkvkvkvkvkvkvkvkvkvkvkvkvkvkvkvkvkvk_P_P
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security> <requestedPrivileges> <requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo></assembly>
KERNEL32.DLL
MSVCRT.dll
USER32.dll
ExitProcess
GetProcAddress
LoadLibraryA
VirtualProtect
IsIconic
kernel32.dll
MSVCRT.dll
USER32.dll
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetStartupInfoA
GetModuleHandleA
_except_handler3
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
PostQuitMessage
SendMessageA
DestroyWindow
DefWindowProcA
CreateWindowExA
UpdateWindow
RegisterClassExA
FindWindowA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
IsIconic
VS_VERSION_INFO
StringFileInfo
5A1332B6
CompanyName
JineJong
FileDescription
JineJong company
FileVersion
Version 2.5.23
InternalName
JineJong
LegalCopyright
Copyright by JineJong
OriginalFilename
JineJong
VarFileInfo
Translation
C:\Users\john\AppData\Local\Temp\6D18584F2B08DC3C6D36EF340190F174.exe
C:\Users\admin\Downloads\factura.exe
C:\796429d6e2a97e86a0afea67fb5d825c4485cbdc8314adcb9372347d641dc336
C:\Documents and Settings\Administrator\Desktop\InTPt2RJ.exe
C:\Users\admin\Downloads\invoice.exe
C:\4ad33f11d0bd3d62a555ec4e07145559804df69ccf03ec151bda30516c93a6d3
C:\a74f324bcdb6d92ee805a96f1fd6101b58163644f0211eceecbd0a525d67bcb4
C:\aa27c89d4ec7e9a751370877a99a3a8c76f94ef0dae0f5184ac32a47d66674ff
C:\Users\admin\Downloads\kyyjs.exe
C:\b59cdf2ecf9c7ffc4433a99f8d0e7565f371f16ed9c35cdfd448929315b0d958
C:\73e6d4eeaae6172e4a896ba4a1c4fa5a2ad97120b70b264d5c48d83adf54a90c
C:\e954e829c564662227ea3ba162931a2bd0e91cca8a6bc91f35b6757f6735abd2
C:\Users\admin\Downloads\kyyjs.exe
C:\bdababd4baa7f6bdfb8555470d6f376b1df972faee231e69c29aca0b9ca340d4
C:\Documents and Settings\Administrator\Desktop\kd882quW.exe
C:\656aa573aeaaf7d0a4baa6e240550de9935853bb026d201c9f8a9fca64ab681b
C:\Users\admin\Downloads\kyyjs.exe
C:\126f56b3b220c9e5f639ddd63e0c1e1b6471507c99b553652056f0e71d8e2123
C:\be3e8728680350dbc18d33655ee37134600f759edfd897706f14d28c2b9f23e0
C:\75a664058dd93e972eef0920190f3daf394f136aa2c09fbe91e1f8ffd191b123
C:\Users\admin\Downloads\kyyjs.exe
C:\0db97d6893d88ed8518aff6bbbcc522ed603c0fb37c105ff28370225be99b19a
C:\074ea9af66e09fcc4376090d07e00df8af0606f2cc696204c41d2a803f777e1b
C:\be60a74d4daedd2b80166471a97d5fc0c810159c3e8b1d57e72a88ef075891e8
C:\63a2fbe8b35b9215b986a6d4a0e1e327d0cc22041545d760abd3d505371fe0f0
C:\Users\Petra\AppData\Local\Temp\kyyjs.pe32
C:\Users\admin\Downloads\1c3a277c02e3ead5_kyyjs.exe
C:\ca75a5a096a34a48a6507a290e7191b79fcb0e73a616ea53fc04e9b7bf507bf1
C:\5b10be19bfd7ce730fe3ff957d629551f8687a1ffb6e4b13f0658ff7b851c124
C:\Users\admin\Downloads\kyyjs.exe
C:\2747295857234748cc53b17ad95b1132f990b9dcd1825d6a1f85546a355a1cbb

Process Tree


03233e7c55091b7eb056290b44ac11f4d1dc9b4c1150a01f76630d59fc64c22d.exe, PID: 1064, Parent PID: 2284

default registry file network process services synchronisation iexplore office pdf

kyyjs.exe, PID: 920, Parent PID: 1064

default registry file network process services synchronisation iexplore office pdf

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

Source Source Port Destination Destination Port
74.125.34.46 80 192.168.56.101 49164

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name ff6c0f5a05b315ea_kyyjs.exe
Filepath C:\Users\Administrator\AppData\Local\Temp\kyyjs.exe
Size 44.3KB
Processes 1064 (03233e7c55091b7eb056290b44ac11f4d1dc9b4c1150a01f76630d59fc64c22d.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5 e7327ebad5fc69df71827bbd2cf9c15d
SHA1 8656c63b63ff0dba8d5b39c11f0ffe16c8583fe9
SHA256 ff6c0f5a05b315ea399df7500bab371a917ee72281e748b2f9a41ea321c92e39
CRC32 64EE5AD9
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.